Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Image Encryption Method Based on Chaotic Map and Chaotic S-Box Substitution

A technology of chaotic mapping and encryption method, applied in image data processing, image data processing, instruments, etc., can solve the problems of unsuitability for digital image encryption, hidden dangers of digital image security, and high redundancy, so as to increase the cost of cracking and improve security. Sexuality, the effect of enhancing relatedness

Active Publication Date: 2022-06-17
HUAQIAO UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because digital images are different from text information and have the characteristics of strong correlation, large data volume, and high redundancy, RSA, Data Standard Encryption (DES), Advanced Encryption Standard (AES), and International Data Encryption Algorithm ( IDEA) and other encryption algorithms are not suitable for the encryption of digital images, which makes digital images have great security risks in the process of transmission and storage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Image Encryption Method Based on Chaotic Map and Chaotic S-Box Substitution
  • An Image Encryption Method Based on Chaotic Map and Chaotic S-Box Substitution
  • An Image Encryption Method Based on Chaotic Map and Chaotic S-Box Substitution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The general idea of ​​the technical solutions in the embodiments of the present application is as follows: a hash value is obtained by performing hash calculation on a color image file, a system parameter P is obtained based on the hash value, and four initial values ​​of a four-dimensional hyperchaotic map are generated based on the hash value , that is, the hash value is used as the system key, and the color image is encrypted by combining the four-dimensional hyperchaotic map and the chaotic S-box to improve the security of image encryption.

[0064] Please refer to Figure 1 to Figure 8 As shown, one of the preferred embodiments of an image encryption method based on chaotic mapping and chaotic S-box substitution of the present invention includes the following steps:

[0065] Step S10, obtaining a color image file, performing hash calculation on the color image file to obtain a hash value as a system key, and calculating a system parameter P based on the hash value;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an image encryption method based on chaotic mapping and chaotic S-box substitution in the technical field of image encryption, including: step S10, obtaining a color image file and performing hash calculation to obtain a hash value, based on the hash value calculation system Parameters; Step S20, generating four initial values ​​of the four-dimensional hyperchaotic map based on the hash value, and then obtaining four sets of chaotic pseudo-random sequences; Step S30, extracting sequences based on the chaotic pseudo-random sequences and system parameters W z , using the sequence W z And use the S box of AES algorithm to generate chaotic S box; Step S40, carry out Arno l d scrambling to color image file to obtain scrambling image, utilize chaotic S box to carry out byte substitution to scrambling image and obtain replacement image; Step S50, Using chaotic pseudo-random sequence and system parameters, image diffusion encryption is performed on the three components of RGB in the substitution image to obtain three ciphertext data, and the encrypted image is obtained based on each ciphertext data. The invention has the advantages of greatly improving the security of image encryption.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method based on chaotic mapping and chaotic S-box substitution. Background technique [0002] With the development of the Internet and multimedia technology, the dissemination and influence of digital images continue to expand, and a large number of digital images are transmitted, shared and stored on the Internet every day. How to ensure the security of digital images involving military, financial, political, medical and other sensitive information during transmission and storage has always been a hot research topic in information security. The most direct way to protect digital images is to encrypt them. However, because digital images are different from text information, they have the characteristics of strong correlation, large amount of data and high redundancy. RSA, Data Standard Encryption (DES), Advanced Encryption Standard (AES), Internationa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06T1/00
CPCG06F21/602G06F21/6209G06T1/0021
Inventor 唐加能陈锦源汤盈慧黄诚惕黄婷婷
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products